Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             79 results found
no title author magazine year volume issue page(s) type
1 A Blockchain-based and resource-aware process execution engine Sturm, Christian

100 C p. 19-34
article
2 A blockchain-based fog computing framework for activity recognition as an application to e-Healthcare services Islam, Naveed

100 C p. 569-578
article
3 A cost-sensitive meta-learning classifier: SPFCNN-Miner Zhao, Linchang

100 C p. 1031-1043
article
4 A data type inference method based on long short-term memory by improved feature for weakness analysis in binary code Jeong, Junho

100 C p. 1044-1052
article
5 A general AI-defined attention network for predicting CDN performance Li, Junnan

100 C p. 759-769
article
6 Agent-based simulation of unmanned aerial vehicles in civilian applications: A systematic literature review and research directions Mualla, Yazan

100 C p. 344-364
article
7 A lighten CNN-LSTM model for speaker verification on embedded devices Zhao, Zitian

100 C p. 751-758
article
8 A lightweight authentication scheme with privacy protection for smart grid communications Zhang, Liping

100 C p. 770-778
article
9 An efficient blind filter: Location privacy protection and the access control in FinTech Li, Zhidan

100 C p. 797-810
article
10 An enhanced priority-based scheduling heuristic for DAG applications with temporal unpredictability in task execution and data transmission Zhang, Xinbo

100 C p. 428-439
article
11 A new approach for mobile robot localization based on an online IoT system Dourado Junior, Carlos M.J.M.

100 C p. 859-881
article
12 An intelligent incentive mechanism for coverage of data collection in cognitive internet of things Liu, Yuxin

100 C p. 701-714
article
13 A novel approach to steganography based on the properties of Catalan numbers and Dyck words Saračević, Muzafer

100 C p. 186-197
article
14 A novel next new point-of-interest recommendation system based on simulated user travel decision-making process Jiao, Xu

100 C p. 982-993
article
15 A self-adaptive and fault-tolerant routing algorithm for wireless sensor networks in microgrids Rui, Lanlan

100 C p. 35-45
article
16 A simple and generic paradigm for creating complex networks using the strategy of vertex selecting-and-pairing Wang, Shuangyan

100 C p. 994-1004
article
17 A unified two-parallel-branch deep neural network for joint gland contour and segmentation learning Wang, Linbo

100 C p. 316-324
article
18 CoCoA++: Delay gradient based congestion control for Internet of Things Rathod, Vishal

100 C p. 1053-1072
article
19 Collaborative SLA and reputation-based trust management in cloud federations Papadakis-Vlachopapadopoulos, Konstantinos

100 C p. 498-512
article
20 Constructing distributed time-critical applications using cognitive enabled services Simpkin, Chris

100 C p. 70-85
article
21 Consumer-facing technology fraud: Economics, attack methods and potential solutions Ali, Mohammed Aamir

100 C p. 408-427
article
22 CyberShip-IoT: A dynamic and adaptive SDN-based security policy enforcement framework for ships Sahay, Rishikesh

100 C p. 736-750
article
23 Data recovery algorithm under intrusion attack for energy internet Deng, Song

100 C p. 109-121
article
24 Deep neural network architectures for social services diagnosis in smart cities Serrano, Emilio

100 C p. 122-131
article
25 Degree-biased random walk for large-scale network embedding Zhang, Yunyi

100 C p. 198-209
article
26 DUSKG: A fine-grained knowledge graph for effective personalized service recommendation Wang, Haifang

100 C p. 600-617
article
27 Dynamic multi-objective optimized replica placement and migration strategies for SaaS applications in edge cloud Li, Chunlin

100 C p. 921-937
article
28 Dynamic multi-workflow scheduling: A deadline and cost-aware approach for commercial clouds Arabnejad, Vahid

100 C p. 98-108
article
29 Edge-based stochastic network model reveals structural complexity of edges Zhai, Xuemeng

100 C p. 1073-1087
article
30 Editorial Board
100 C p. ii
article
31 Efficient data packet transmission algorithm for IPV6 mobile vehicle network based on fast switching model with time difference Liang, Wei

100 C p. 132-143
article
32 Efficient quantum-based security protocols for information sharing and data protection in 5G networks EL-Latif, Ahmed A. Abd

100 C p. 893-906
article
33 Elastic and cost-effective data carrier architecture for smart contract in blockchain Liu, Xiaolong

100 C p. 590-599
article
34 Energy-Efficient IoT Service Composition for Concurrent Timed Applications Sun, Mengyu

100 C p. 1017-1030
article
35 FCA-based knowledge representation and local generalized linear models to address relevance and diversity in diverse social images Benavent, Xaro

100 C p. 250-265
article
36 GC-Wise: A Self-adaptive approach for memory-performance efficiency in Java VMs Simão, J.

100 C p. 674-688
article
37 Graph-based and scenario-driven microservice analysis, retrieval, and testing Ma, Shang-Pin

100 C p. 724-735
article
38 How to make a digital currency on a blockchain stable Saito, Kenji

100 C p. 58-69
article
39 Identifying malicious social media contents using multi-view Context-Aware active learning Das Bhattacharjee, Sreyasee

100 C p. 365-379
article
40 Improving fog computing performance via F og-2- F og collaboration Al-khafajiy, Mohammed

100 C p. 266-280
article
41 InsideNet: A tool for characterizing convolutional neural networks Muñoz-Martínez, Francisco

100 C p. 298-315
article
42 Integrating selective undo of feature-based modeling operations for real-time collaborative CAD systems Lv, Xiao

100 C p. 473-497
article
43 KEcruiser: A novel control flow protection for kernel extensions Tian, Donghai

100 C p. 1-9
article
44 Lifetime-aware real-time task scheduling on fault-tolerant mixed-criticality embedded systems Cao, Kun

100 C p. 165-175
article
45 LoC — A new financial loan management system based on smart contracts Wang, Hao

100 C p. 648-655
article
46 Machine learning in the Internet of Things: Designed techniques for smart cities Din, Ikram Ud

100 C p. 826-843
article
47 Measuring and rating the energy-efficiency of servers von Kistowski, Jóakim

100 C p. 579-589
article
48 Mobile crowdsensing: A survey on privacy-preservation, task management, assignment models, and incentives mechanisms Khan, Fazlullah

100 C p. 456-472
article
49 Multiobjective feature selection for microarray data via distributed parallel algorithms Cao, Bin

100 C p. 952-981
article
50 Mutation operator integrated ant colony optimization based domestic appliance scheduling for lucrative demand side management Silva, Bhagya Nathali

100 C p. 557-568
article
51 Neural network architecture based on gradient boosting for IoT traffic prediction Lopez-Martin, Manuel

100 C p. 656-673
article
52 On hybrid network coding for visual traffic surveillance Ling, Chih Wei

100 C p. 440-455
article
53 Perception layer security in Internet of Things Khattak, Hasan Ali

100 C p. 144-164
article
54 Pipeline-integrity: Scaling the use of authenticated data structures up to the cloud Pennino, Diego

100 C p. 618-647
article
55 Profiling the scheduling decisions for handling critical paths in deadline-constrained cloud workflows Taal, Arie

100 C p. 237-249
article
56 Realizing integrated prioritized service in the Hadoop cloud system Yeh, Tsozen

100 C p. 176-185
article
57 Recommending heterogeneous resources for science gateway applications based on custom templates composition Antequera, Ronny Bazan

100 C p. 281-297
article
58 Resource allocation and computation offloading with data security for mobile edge computing Elgendy, Ibrahim A.

100 C p. 531-541
article
59 RF-based drone detection and identification using deep learning approaches: An initiative towards a large open source drone database Al-Sa’d, Mohammad F.

100 C p. 86-97
article
60 Robust secure communication protocol for smart healthcare system with FPGA implementation Sureshkumar, Venkatasamy

100 C p. 938-951
article
61 RRSD: A file replication method for ensuring data reliability and reducing storage consumption in a dynamic Cloud-P2P environment Sun, ShengYao

100 C p. 844-858
article
62 Runtime evaluation of cognitive systems for non-deterministic multiple output classification problems Gopalakrishna, Aravind Kota

100 C p. 1005-1016
article
63 Secure conjunctive multi-keyword ranked search over encrypted cloud data for multiple data owners Yin, Hui

100 C p. 689-700
article
64 Secure virtual machine placement in cloud data centers Agarwal, Amit

100 C p. 210-222
article
65 Securing IoTs in distributed blockchain: Analysis, requirements and open issues Moin, Sana

100 C p. 325-343
article
66 Smart electronic gastroscope system using a cloud–edge collaborative framework Ding, Shuai

100 C p. 395-407
article
67 Social event decomposition for constructing knowledge graph Nguyen, Hoang Long

100 C p. 10-18
article
68 Spatio-temporal context-aware collaborative QoS prediction Zhou, Qimin

100 C p. 46-57
article
69 Stackelberg model based game theory approach for assortment and selling price planning for small scale online retailers Saberi, Zahra

100 C p. 1088-1102
article
70 Statistical modeling of keystroke dynamics samples for the generation of synthetic datasets Migdal, Denis

100 C p. 907-920
article
71 Survey of agent-based cloud computing applications De la Prieta, Fernando

100 C p. 223-236
article
72 Three party secure data transmission in IoT networks through design of a lightweight authenticated key agreement scheme Ostad-Sharif, Arezou

100 C p. 882-892
article
73 Towards extending the SWITCH platform for time-critical, cloud-based CUDA applications: Job scheduling parameters influencing performance Knight, Louise

100 C p. 542-556
article
74 Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset Koroniotis, Nickolaos

100 C p. 779-796
article
75 Unsupervised multi-stage attack detection framework without details on single-stage attacks Shin, Jinmyeong

100 C p. 811-825
article
76 Unsupervised multi-view non-negative for law data feature learning with dual graph-regularization in smart Internet of Things Qiu, Xiru

100 C p. 523-530
article
77 Virtual machine allocation and migration based on performance-to-power ratio in energy-efficient clouds Ruan, Xiaojun

100 C p. 380-394
article
78 Wale: A solution to share libraries in Docker containers D’Urso, Fabio

100 C p. 513-522
article
79 Witness-based searchable encryption with optimal overhead for cloud-edge computing Chen, Yu-Chi

100 C p. 715-723
article
                             79 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands